ELSA-2008-0233

ELSA-2008-0233 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2008-05-08

Description



[2.6.18-53.1.19.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [ORA 6045759]
- [NET] Fix msi issue with kexec/kdump (Michael Chan) [ORA 6219364]
- [MM] Fix alloc_pages_node() static nid' race made kernel crash (Joe Jin) [ORA 6187457]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [ORA 6263574]
- [dio] fix error-path crashes (Linux Torvalds) [ORA 6242289]

[2.6.18-53.1.19.el5]
- [xen] check num of segments in block backend driver (Bill Burns ) [378281]
- [x86_64] update IO-APIC dest field to 8-bit for xAPIC (Dave Anderson ) [442922]
- Update: [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}
- Update: [xen] ia64: ftp stress test fixes between HVM/Dom0 (Tetsu Yamamoto ) [427400] {CVE-2008-1619}

[2.6.18-53.1.18.el5]
- Update: [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}

[2.6.18-53.1.17.el5]
- [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}
- [pci] hotplug: PCI Express problems with bad DLLPs (Kei Tokunaga ) [440438]
- [nfs] stop sillyrenames and unmounts from racing (Steve Dickson ) [440447]
- [x86] clear df flag for signal handlers (Jason Baron ) [437316] {CVE-2008-1367}
- [xen] ia64: ftp stress test fixes between HVM/Dom0 (Tetsu Yamamoto ) [427400] {CVE-2008-1619}
- [xen] ia64: fix ssm_i emulation barrier and vdso pv (Tetsu Yamamoto ) [427400] {CVE-2008-1619}

[2.6.18-53.1.16.el5]
- [misc] fix range check in fault handlers with mremap (Vitaly Mayatskikh ) [428970]
- [video] neofb: avoid overwriting fb_info fields (Anton Arapov ) [430253]

[2.6.18-53.1.15.el5]
- [libata] sata_nv: un-blacklist hitachi drives (David Milburn ) [433617]
- [libata] sata_nv: may send cmds with duplicate tags (David Milburn ) [433617]
- [s390] qdio: output queue stall on FCP and net devs (Hans-Joachim Picht ) [412071]
- [xen] ia64: guest has bad network performance (Tetsu Yamamoto ) [433616]


Related CVEs


CVE-2008-1367
CVE-2008-1375
CVE-2008-1619
CVE-2007-5498
CVE-2008-0007
CVE-2008-1669

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-53.1.19.0.1.el5.src.rpmbfce3a396ed62389ca08e42d6c6f0fb0bcc43268e474495f6c4bd65e452c1533ELSA-2019-4732el5_u1_i386_patch
ocfs2-2.6.18-53.1.19.0.1.el5-1.2.8-2.el5.src.rpm41c926f09f5c5f5e0221fccc32093c446881a4f50ad26f5d228ae9a6c6134166ELBA-2008-2004el5_u1_i386_patch
oracleasm-2.6.18-53.1.19.0.1.el5-2.0.4-1.el5.src.rpm8d7af92687216824199770826b1b4fb06dbe91517c75791cd2a66138d4e5c378-el5_u1_i386_patch
kernel-2.6.18-53.1.19.0.1.el5.i686.rpm7cf8137faa7025b11f0d0d74f2082ba4a056f90330e1ced62a2268d84690805eELSA-2019-4732el5_u1_i386_patch
kernel-PAE-2.6.18-53.1.19.0.1.el5.i686.rpmbbac7e3adcd5fa0b28e865e5ddce7e28b523f951423defdf758c40b6c5c35840ELSA-2019-4732el5_u1_i386_patch
kernel-PAE-devel-2.6.18-53.1.19.0.1.el5.i686.rpme64ed29a6514f018d7ec518a89fd85ad1f62c1931c5fdf3922c87a0564aeb601ELSA-2019-4732el5_u1_i386_patch
kernel-debug-2.6.18-53.1.19.0.1.el5.i686.rpm901461e6fdff7a033ba203623f177c9012dd4677cc73e077e112b2300d5f840aELSA-2019-4732el5_u1_i386_patch
kernel-debug-devel-2.6.18-53.1.19.0.1.el5.i686.rpma1772f614d0868a78d5b5ce9b1392f04fce515670a9de6a9198d586f8de76bb5ELSA-2019-4732el5_u1_i386_patch
kernel-devel-2.6.18-53.1.19.0.1.el5.i686.rpmee7841805af12527c6f1dc2ba5fc09f2ece01a13747f97f15751e136345da356ELSA-2019-4732el5_u1_i386_patch
kernel-doc-2.6.18-53.1.19.0.1.el5.noarch.rpm486236d0aacceb20cec7f0a08d86cdea576d9f4fe641cf6e6b9091cb126688a4ELSA-2019-4732el5_u1_i386_patch
kernel-headers-2.6.18-53.1.19.0.1.el5.i386.rpmc2b530bc087cf3c483e0e0db64d95468f2f1fa7a6c62de2f27928727d218b6e4ELSA-2019-4732el5_u1_i386_patch
kernel-xen-2.6.18-53.1.19.0.1.el5.i686.rpm887980d8fe4c21d4a40625fd4d1afe0da2cebfe03c1fdf59cb0b472756d0afb6ELSA-2019-4732el5_u1_i386_patch
kernel-xen-devel-2.6.18-53.1.19.0.1.el5.i686.rpm5fdbd39fc2097ef2c464207f425b9c5e6da15d78fe94f0c0440cc5e61bbd8c9cELSA-2019-4732el5_u1_i386_patch
ocfs2-2.6.18-53.1.19.0.1.el5-1.2.8-2.el5.i686.rpmfc86b393d50015a699cf924cbf59871ff5b8ee8278f5df4a87db0bcfe4cf0ab8ELBA-2008-2004el5_u1_i386_patch
ocfs2-2.6.18-53.1.19.0.1.el5PAE-1.2.8-2.el5.i686.rpm6047c0d67a4beaaa5c6ee349d9f6a33208d7899eb5daea6a3da7d3423e29ed14ELBA-2008-2004el5_u1_i386_patch
ocfs2-2.6.18-53.1.19.0.1.el5debug-1.2.8-2.el5.i686.rpm58598cadaa484df6742c33f8a93bcc09cdd5036d4553a638efc114b838ab4f0cELBA-2008-2004el5_u1_i386_patch
ocfs2-2.6.18-53.1.19.0.1.el5xen-1.2.8-2.el5.i686.rpm54e2253a4e22f17864ba6706a41c53517774375c5ad3a8bb6781fafece2faaaaELBA-2008-2004el5_u1_i386_patch
oracleasm-2.6.18-53.1.19.0.1.el5-2.0.4-1.el5.i686.rpmb0b161aebfae451b161881ad55a3f20e1b7a392355f14aac3db1305d26f0ff7a-el5_u1_i386_patch
oracleasm-2.6.18-53.1.19.0.1.el5PAE-2.0.4-1.el5.i686.rpm4a3ecd792ea6d2b7e7f0f168b00ec5e48bdf9179048d121d7f36d26e6b5639fc-el5_u1_i386_patch
oracleasm-2.6.18-53.1.19.0.1.el5debug-2.0.4-1.el5.i686.rpm476a066a198ea221f020ef74b58ccec6e356afdd150167cd8b33f8e3765733db-el5_u1_i386_patch
oracleasm-2.6.18-53.1.19.0.1.el5xen-2.0.4-1.el5.i686.rpme0cfabc2d489f0f60af2332d2d312489a811c52649d9c8f5567a37b43d620544-el5_u1_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-53.1.19.0.1.el5.src.rpmbfce3a396ed62389ca08e42d6c6f0fb0bcc43268e474495f6c4bd65e452c1533ELSA-2019-4732el5_u1_x86_64_patch
ocfs2-2.6.18-53.1.19.0.1.el5-1.2.8-2.el5.src.rpm41c926f09f5c5f5e0221fccc32093c446881a4f50ad26f5d228ae9a6c6134166ELBA-2008-2004el5_u1_x86_64_patch
oracleasm-2.6.18-53.1.19.0.1.el5-2.0.4-1.el5.src.rpm8d7af92687216824199770826b1b4fb06dbe91517c75791cd2a66138d4e5c378-el5_u1_x86_64_patch
kernel-2.6.18-53.1.19.0.1.el5.x86_64.rpmc06d4a95f4e3b7e0b24cfe189788370337907acb2036201d0732a5ef9dfce1feELSA-2019-4732el5_u1_x86_64_patch
kernel-debug-2.6.18-53.1.19.0.1.el5.x86_64.rpm3d71f4bb86bda5020d2cada3f5edef071bf1eb2b2924888a368a50833f6ebe66ELSA-2019-4732el5_u1_x86_64_patch
kernel-debug-devel-2.6.18-53.1.19.0.1.el5.x86_64.rpm8d1d75bd587a8edecaa639dafbbe7f72745690a5ef9cf3865182442c9c2f3dd9ELSA-2019-4732el5_u1_x86_64_patch
kernel-devel-2.6.18-53.1.19.0.1.el5.x86_64.rpm01db301c07c11c743cf64d6ae22eae26f11e49637ccad4660452a75f43dfbe11ELSA-2019-4732el5_u1_x86_64_patch
kernel-doc-2.6.18-53.1.19.0.1.el5.noarch.rpm486236d0aacceb20cec7f0a08d86cdea576d9f4fe641cf6e6b9091cb126688a4ELSA-2019-4732el5_u1_x86_64_patch
kernel-headers-2.6.18-53.1.19.0.1.el5.x86_64.rpm4c02c30d27f4a9e18facf3aa861ba55c7d999d4adffc969a45da2d1a60a84382ELSA-2019-4732el5_u1_x86_64_patch
kernel-xen-2.6.18-53.1.19.0.1.el5.x86_64.rpmec6d9e6ec82f6c5b82bf254452667128220e4184d6b28ff932eacbc6cc842e38ELSA-2019-4732el5_u1_x86_64_patch
kernel-xen-devel-2.6.18-53.1.19.0.1.el5.x86_64.rpma193bbde33524992307584dcc324ddbfdbc704d9237bf3fa83ed9a8b1bc5af63ELSA-2019-4732el5_u1_x86_64_patch
ocfs2-2.6.18-53.1.19.0.1.el5-1.2.8-2.el5.x86_64.rpmb163514d7803ddf4d272dd5fd6aad60ef17a3a7764ff6ed4b666c99abb0d2445ELBA-2008-2004el5_u1_x86_64_patch
ocfs2-2.6.18-53.1.19.0.1.el5debug-1.2.8-2.el5.x86_64.rpm9a06effd41b67403ea0056811b8c0eac874b3caf3f374ffe52b57d21a3dc6c57ELBA-2008-2004el5_u1_x86_64_patch
ocfs2-2.6.18-53.1.19.0.1.el5xen-1.2.8-2.el5.x86_64.rpmf87be3023436c07c84979fe449878e8374ab83c8366d2ea88dfea0aec754b8ddELBA-2008-2004el5_u1_x86_64_patch
oracleasm-2.6.18-53.1.19.0.1.el5-2.0.4-1.el5.x86_64.rpm0cab19b66c2ef0b943857f03552143d1698d5ddc55570d0f42eed98aef421833-el5_u1_x86_64_patch
oracleasm-2.6.18-53.1.19.0.1.el5debug-2.0.4-1.el5.x86_64.rpm14386ea3e87fc2774f8d4fde3edfb8da2266c585b9e5ebfd0fe52d30e0a75727-el5_u1_x86_64_patch
oracleasm-2.6.18-53.1.19.0.1.el5xen-2.0.4-1.el5.x86_64.rpmc0417dd4f15a10b30edf8c5a6df763dd3a04968dca371b882b663d09152dd47e-el5_u1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete